Sanitizers is a collection of analysis tools tools:
AddressSanitizer (detects addressability issues)
LeakSanitizer (detects memory leaks)
ThreadSanitizer (detects data races and deadlocks) for C++ and Go
MemorySanitizer (detects use of uninitialized memory)
https://github.com/google/sanitizers
The AddressSanitizer has recently obtained Intel MPX support:
On July 2013 Intel released documentation on the upcoming instruction set extensions, including the Memory Protection Extensions (MPX). Here we will discuss the applicability of MPX for memory error detection. Links: MPX-enabled GCC wiki; Using the MPX-enabled GCC and SDE (emulator); Fresh documentation on Intel ISA which includes MPX; Intel Pointer Checker. Some external feedback: 1, 2, 3. NEW As of January 2016, Intel MPX is available in hardware and one can actually try how it works!
https://github.com/google/sanitizers/wiki/AddressSanitizerIntelMemoryProtectionExtensions